Twitter, search robots get welcomes from Obama White House
- 22 January, 2009 12:35
Kottke, in an e-mail response to a question from Computerworld , said the material that was disallowed from being indexed by the Bush administration primarily consisted of "text-only duplicates of hundreds of pages. I would argue those text-only pages should be included in search indexes, but it doesn't look like there [was] a conspiratorial attempt to hide information."
Nevertheless, Kottke thinks that by eliminating the Bush disallow list on its first day in office, the Obama administration was sending out a symbolic message. "One of Obama's big talking points during the campaign and transition was a desire for a more transparent government, and the spare robots.txt file is a symbol of that desire," Kottke wrote.
The nearly blank disallow slate may not last long, though. "As the site grows and accumulates more content," Kottke added, "I'm sure they'll need to add to the directories and scripts that search engines shouldn't index."
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Queensland government to provide 200 services online by 2015
Call Centers Suffer From Big Data Overload
CIO 100: Carsales wins top gong for innovation
How to secure passwords and other critical numbers
Australian National University streamlines IT
Top 10 Mistakes in Data Centre Operations: Operating Efficient and Effective Data Centres
How can you avoid making major mistakes when operating and maintaining your data centre(s)? The key lies in the methodology behind your operations and maintenance program. This whitepaper explores the top ten mistakes in data centre operations. Read now.
Meeting Business Data Protection
When it comes to data back-up and recovery, the rules have changed. Virtualization has enabled IT organisations to become more efficient, but also more complex. This whitepaper addresses these new realities, and provides a comprehensive solution for virtual and physical environments, backup of applications and data, disaster recovery and replication of complete systems or applications, and for ensuring high availability of mission-critical services.
Delivering Enterprise Information Securely on Android and Apple Devices
This whitepaper describes, from an IT perspective, the issues that arise when allowing Android and iOS-based tablets and smartphones into the enterprise network—and the steps IT must take to maintain control while encouraging productivity and mobility. We outline the security considerations, risk mitigation options and the architecture required to support tablets and smartphones as consumer-grade devices accessing sensitive enterprise data. Download to find out more!